Platform9 Managed Kubernetes
Platform9 Managed Kubernetes –
Managed Kubernetes Prerequisites
Platform9 supports the node operating systems Ubuntu LTS 16 (64-bit) .
Prerequisites
- Operating system : ubuntu 16.04 LTS
- Disk space : Minimum 20gb
- RAM : 4gb
- Networking : 1 physical NIC with an ip address
- No of VM’s : 2 (1-master ,1-node)
Mandatory Guidelines : About Image
1
2 3 4 5 6 |
1) Everything should be built on VMs only.Ubuntu16.04 LTS.VMs should be based on KVM hypervisor
No other hypervisor (VMWare,Virtualbox) is allowed. 2) All VMs sholud be launched with below qcow2 image. → ncd-ubuntu1604min-lxd3.3.0-v2.qcow2 Above file available at ncdftp@192.168.12.142:/home/ncdftp/Lkvms2 password for ncdftp user is ncodeit1234 |
Disk Space Prerequisites
Each node should generally have at least 20 GB of free disk space.
RAM Prerequisites
The recommended RAM requirements are a minimum of 4 GB of RAM.
Networking Prerequisites
- Each node should have at least one physical (or VLAN backed) NIC with an IP address.
- For each Kubernetes cluster that you plan to create, you must specify two unused IP subnets that are not in use by your internal network. The subnets are specified in CIDR form, and are referred to as Containers CIDR and Services CIDR.
In general, you should not configure your network equipment to route or otherwise be aware of those subnets. Kubernetes uses the first network range to route packets between pods or containers in a cluster. The network mask is subdivided into two portions: the intra-node portion determines how many Kubernetes pods can run on a single node, and the inter-node portion determines the maximum number of nodes in a cluster. By default, the intra-node portion is 8 bits, i.e. up to 256 pods per node. So a network mask of 12 bits would allow clusters to have up to 16 nodes. For example, a new cluster named DevCluster is created with Containers CIDR=10.96.0.0/12 and Services CIDR=10.96.1.0/12 - The nodes should have direct Internet access.
If Masters and Workers run in a restrictive network environment, ensure the following.
Masters must be able to receive incoming connections on the following ports.
Masters must be able to receive incoming connections on the following ports.
Protocol | Port Range | Source | Purpose |
---|---|---|---|
TCP | 443 | Workers and Clients | Kubernetes API |
TCP | 2379-2380 | Masters | etcd |
UDP | 8285 | Masters and Workers | flannel |
Worker nodes must be able to receive incoming connections on the following ports.
Protocol | Port Range | Source | Purpose |
---|---|---|---|
TCP | 10250 | Masters and Workers | Kubelet API for exec and logs |
TCP | 10255 | Masters and Workers | Read-only Kubelet API |
TCP | 4194 | Masters and Workers | cAdvisor |
TCP | 30000-32767 | Application Clients | Default port range for NodePort Services |
UDP | 8285 | Masters and Workers | flannel |
Note : Swap must be disabled on the host.
1
|
sudo swapoff -a
|
Run the following command to update fstab so that swap remains disabled after a reboot.
1
|
sudo sed -i '/ swap / s/^\(.*\)$/#\1/g' /etc/fstab
|
No comments:
Post a Comment